Sciweavers

2848 search results - page 124 / 570
» A Contract Based System For Large Data Visualization
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 6 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
127
Voted
CVPR
2012
IEEE
13 years 5 months ago
Scalable k-NN graph construction for visual descriptors
The k-NN graph has played a central role in increasingly popular data-driven techniques for various learning and vision tasks; yet, finding an efficient and effective way to con...
Jing Wang, Jingdong Wang, Gang Zeng, Zhuowen Tu, R...
146
Voted
SENSYS
2004
ACM
15 years 8 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...
135
Voted
ICANN
2010
Springer
15 years 3 months ago
Learning Invariant Visual Shape Representations from Physics
3D shape determines an object's physical properties to a large degree. In this article, we introduce an autonomous learning system for categorizing 3D shape of simulated objec...
Mathias Franzius, Heiko Wersing
169
Voted
ICDIM
2006
IEEE
15 years 8 months ago
Model-Driven Development of Content-Based Image Retrieval Systems
: Generic systems for content-based image retrieval (CBIR), such as QBIC [7] cannot be used to solve domain-specific image retrieval problems, as for example, the identification of...
Temenushka Ignatova